Cargando…

Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone

Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and...

Descripción completa

Detalles Bibliográficos
Autores principales: Ko, Yongho, Kim, Jiyoon, Duguma, Daniel Gerbi, Astillo, Philip Virgil, You, Ilsun, Pau, Giovanni
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8000982/
https://www.ncbi.nlm.nih.gov/pubmed/33804023
http://dx.doi.org/10.3390/s21062057
_version_ 1783671123327582208
author Ko, Yongho
Kim, Jiyoon
Duguma, Daniel Gerbi
Astillo, Philip Virgil
You, Ilsun
Pau, Giovanni
author_facet Ko, Yongho
Kim, Jiyoon
Duguma, Daniel Gerbi
Astillo, Philip Virgil
You, Ilsun
Pau, Giovanni
author_sort Ko, Yongho
collection PubMed
description Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and their demand grows, they are becoming more and more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, and spoofing. In order to cope with such attacks and security threats, a proper design of robust security protocols is indispensable. Although several pieces of research have been carried out with this regard, there are still research gaps, particularly concerning UAV-to-UAV secure communication, support for perfect forward secrecy, and provision of non-repudiation. Especially in a military scenario, it is essential to solve these gaps. In this paper, we studied the security prerequisites of the UAV communication protocol, specifically in the military setting. More importantly, a security protocol (with two sub-protocols), that serves in securing the communication between UAVs, and between a UAV and a Ground Control Station, is proposed. This protocol, apart from the common security requirements, achieves perfect forward secrecy and non-repudiation, which are essential to a secure military communication. The proposed protocol is formally and thoroughly verified by using the BAN-logic (Burrow-Abadi-Needham logic) and Scyther tool, followed by performance evaluation and implementation of the protocol on a real UAV. From the security and performance evaluation, it is indicated that the proposed protocol is superior compared to other related protocols while meeting confidentiality, integrity, mutual authentication, non-repudiation, perfect forward secrecy, perfect backward secrecy, response to DoS (Denial of Service) attacks, man-in-the-middle protection, and D2D (Drone-to-Drone) security.
format Online
Article
Text
id pubmed-8000982
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-80009822021-03-28 Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone Ko, Yongho Kim, Jiyoon Duguma, Daniel Gerbi Astillo, Philip Virgil You, Ilsun Pau, Giovanni Sensors (Basel) Article Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and their demand grows, they are becoming more and more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, and spoofing. In order to cope with such attacks and security threats, a proper design of robust security protocols is indispensable. Although several pieces of research have been carried out with this regard, there are still research gaps, particularly concerning UAV-to-UAV secure communication, support for perfect forward secrecy, and provision of non-repudiation. Especially in a military scenario, it is essential to solve these gaps. In this paper, we studied the security prerequisites of the UAV communication protocol, specifically in the military setting. More importantly, a security protocol (with two sub-protocols), that serves in securing the communication between UAVs, and between a UAV and a Ground Control Station, is proposed. This protocol, apart from the common security requirements, achieves perfect forward secrecy and non-repudiation, which are essential to a secure military communication. The proposed protocol is formally and thoroughly verified by using the BAN-logic (Burrow-Abadi-Needham logic) and Scyther tool, followed by performance evaluation and implementation of the protocol on a real UAV. From the security and performance evaluation, it is indicated that the proposed protocol is superior compared to other related protocols while meeting confidentiality, integrity, mutual authentication, non-repudiation, perfect forward secrecy, perfect backward secrecy, response to DoS (Denial of Service) attacks, man-in-the-middle protection, and D2D (Drone-to-Drone) security. MDPI 2021-03-15 /pmc/articles/PMC8000982/ /pubmed/33804023 http://dx.doi.org/10.3390/s21062057 Text en © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ko, Yongho
Kim, Jiyoon
Duguma, Daniel Gerbi
Astillo, Philip Virgil
You, Ilsun
Pau, Giovanni
Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone
title Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone
title_full Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone
title_fullStr Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone
title_full_unstemmed Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone
title_short Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone
title_sort drone secure communication protocol for future sensitive applications in military zone
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8000982/
https://www.ncbi.nlm.nih.gov/pubmed/33804023
http://dx.doi.org/10.3390/s21062057
work_keys_str_mv AT koyongho dronesecurecommunicationprotocolforfuturesensitiveapplicationsinmilitaryzone
AT kimjiyoon dronesecurecommunicationprotocolforfuturesensitiveapplicationsinmilitaryzone
AT dugumadanielgerbi dronesecurecommunicationprotocolforfuturesensitiveapplicationsinmilitaryzone
AT astillophilipvirgil dronesecurecommunicationprotocolforfuturesensitiveapplicationsinmilitaryzone
AT youilsun dronesecurecommunicationprotocolforfuturesensitiveapplicationsinmilitaryzone
AT paugiovanni dronesecurecommunicationprotocolforfuturesensitiveapplicationsinmilitaryzone